11,217 official + unofficial events during SXSW (last updated March 23, 2015). Our goal is to be the most complete guide. Anything missing?Official details at sxsw.com. South by Southwest, SXSW, and related marks and logos are trademarks of SXSW, LLC., used with permission. Follow @sched + @SouthByFreeNOMS

Sign up or log in to save this to your schedule and see who's attending!

ATTENTION: This session requires advance signup to attend. For Online Schedule: Please utilize the RSVP link below the description to reserve your seat. For SXSW GO App: Use the RSVP 'Find a Timeslot' link. You must have a SXSW Interactive, Gold, or Platinum badge to attend, and, you must have an activated SXsocial account (social.sxsw.com) to reserve a seat. If you have any issues with signing up, please email support@sxsw.com. VERY IMPORTANT: Because of the limited space, we recommend you arrive at least 15 minutes prior to the published start time of this session. If you have not checked in at the room you RSVPed for at least five minutes prior to the session start time, you may lose your seat to an attendee in the waiting list line. Prerequisites: Working knowledge of the command line and some basic level of programming. What to Bring: You need a laptop (mac or linux) that you can install software on and a github account. Writing code that works is hard. Writing rugged code that can stand the test of time is even harder. This difficulty is often compounded by crunched timelines and fast cycles that prioritize new features. Add in evolving business needs and new technology and it becomes confusing to know what to do and how to integrate security into your application. This workshop brings in some of the top developers and application security practitioners to help you ruggedize your end-to-end development lifecycle from code commit to running system. Three Takeaways: 1. You will learn pragmatic approaches and tooling that will affect your development processes and delivery pipelines. 2. Armed with tools and ideas for monitoring your operational and runtime security. 3. You will walk away with code examples and tools that you can put into practice right away for security and rugged testing.